Large Amount of Data GIF Image Encryption with High Security using Path-based Animation
|
|
- Bethany Harrison
- 5 years ago
- Views:
Transcription
1 Large Amount of Data GIF Image Encryption with High Security using Path-based Animation Hind Rostom Mohammed University of Kufa College of Mathematical &Computer Sciences/Computer Dept. Ebtesam Najim Abdullah University of Kufa Informatics Center for Research and Rehabilitation Ameer Abd Al-Razaq University of Kufa Computer Center Abstract This study deals with constructing and implementing new algorithm based on hiding a large amount of data (image, audio, text) file into color GIF image. We have been used adaptive image filtering and adaptive image segmentation with bits replacement on the appropriate pixels. These pixels are selected randomly with Path-based animation rather than sequentially using new concept. This concept based on both visual and statistical that defined by main cases with there cases for each byte in one pixel. High security layers have been proposed through multi layers to make it difficult to break through the encryption of the input data using RC6 algorithm. The proposed algorithm can embed efficiently a large amount of data that has been reached to 86% of the image size with high quality of the output. The proposed method depended on two factors: First, the image which is containing the encrypted text, this image is GIF type which is the abbreviation of ( Graphics Interchange Format Image), and the Second factor is the text targeted by encryption and entering within the image. Keywords: Graphics Interchange Format Image, Encryption, Flash Card, Internet, Information Transfer. 1-Introduction Nowadays, information security is becoming more important in data storage and transmission. Images are widely used in several processes. Therefore, the protection of image data from unauthorized access is important. In digital world, the security of digital images becomes more and more important since the communications of digital products over open network occur more and more frequently, movement is actually made up of many frames. Image encryption plays a significant role in the field of information hiding. It is argued that the encryption algorithms, which have been originally developed for text data, are not suitable for securing many real-time multimedia applications because of large data sizes. Software implementations of ciphers are usually too slow to process image and video data in commercial systems. Hardware 1
2 implementations, on the other hand, add more cost to service providers and consumer electronics device manufacturers. Animation is the rapid display of a sequence of images of artwork or mode l positions or frames in order to create an illusion of movement. Animation starts with independent pictures and puts them together to form the illusion of continuous motion. In animation jargon, each image is called a frame [1]. An object seen by the human eye remains chemically mapped on the eye s retina for a brief time after viewing. This phenomenon is called persistence of vision. The human mind needs to conceptually complete a perceived action. This phenomenon is called phi. Usually, movies will run at 25 to 30 fps but computer animations can run at 12 to 15 fps. Anything less than 12fps will be jerky motion as the eye is able to detect the changes from one frame to the next. GIF (Graphics Interchange Format ) is Image format that is widely used on the World Wide Web, both for still images (palletised color raster images) and for animations. The GIF format is particularly suited to rendering images that contain large blocks of the same color, or large blocks of repeating patterns. Additionally, it does not suffer from the lossyness that leaves JPEG unable to display flat, clean, color without losing all compression. Therefore, whenever a logo is seen on the internet, chances are that it is a GIF [2]. A very useful advantage of the.gif format over the newer ones is the support for animations. One of the versions GIF is allows for a short sequence of images to be stored within a single file, which brings on the animation effect on the computer screen. One of the main reasons for the GIF image file format to be less used today is the Unisys patented data compression algorithm called LZW it is based on. The proprietary nature of GIF requires that it is distributed through image-handling software only under strict licensing conditions. In GIF Image animation, the frame GIF Images (every pixel of each frame) are first loaded into the system memory and are then rapidly displayed on the screen from the memory. GIF Image animation takes huge amount of memory since all pixel information is to be first loaded into memory. In vector animation, the images for each frame are calculated and generated by the computer. Vector animation takes up lesser memory space, but more time is generally needed to create the images than to load them from memory or disk. In this research, we collect the information of the text from the encrypted image using very good algorithm of encryption to send through the internet to recipient. The process of analyzing and encrypting the image can be divided into two parts: (i) determining start points at each encrypted text included within the image and letting the algorithm start with which to help us secure transferring message process. These separated encrypted texts are best symbolized within the image by point- like vector at equivalent distances then comes the process of (ii) embodying the original image points within the encrypted texts. After that it will be transferred through a coordinated format agreed upon with recipient so he can reformat it in their correct format after receiving it, therefore all deviated points are excluded due the "text noise" which is attached to the image data [3]. Experiments shows more reliance on the suggested method for improving the exactitude of the encryption process in the same time keeping the original data of the target image, this suggested method over comes the problem of having defects of code 2
3 easy decoding and regarding the problem of inaccurate recognition between the included images data and included text. 2- Common Techniques of Animation: [4]: There are three techniques of animation (A) Keyframe Animation Historically, the animator has to create every frame of an animation by hand. Depending on the quality, one minute of animation might require between 720 and 1800 separate still images. Each frame in an animation reflects small changes from the previous frame. The master artists by having them draw only the important frames, called key frames. Junior animators or assistants could then draw the frames that were required in between the key frames. The in-between frames are called tweens [5]. (B) Path Animation Moves an object along a pre-determined path-straight line or curve on the screen. Object does not change although it can be resized or reshaped. The tweening motion is an example of path animation-key frames (starting point and the destination point) are set and the program does the in-betweening for you. Tweening: process of generating intermediate frames between two images to give the appearance that the first image evolves smoothly into the second image. Animated GIFs Sequence of images can be stored in a single GIF file, and displayed one after another by a Web browser or other software There is no browser plug-in can specify looping and delay between frames, 256 color palette and no sound [6]. Fig.(1) shows the path animation. (C) Cel Animation Cel comes from the word celluloid (transparent sheet material) used to draw the images and place them on a stationary background. The background does not change but the object does, example of the cel animation shown in Fig. (2). 3 Figure (1): Path Animation.
4 Figure (2): Composite Image. 4
5 Table (1): RC6 Algorithm Encryption and Decryption. RC6 Algorithm Encryption RC6 Algorithm Decryption result will appear in the text tab after decoding [2], see Table (1). Encryption: Plain text stored in four w-bit input registers A, B, C, D Decryption :Cipher text stored in four w-bit input registers A, B, C, D B = B + S [0] D = D + S [1] for i = 1 up to r do { t = (B X (2B + 1)) <<< lg w u = (D X (2D + 1)) <<< lg w A = ((A t) <<< u) + S [2i] C = ((C u) <<< t) + S [2i+ 1] (A, B, C, D) = (B, C, D, A) } A = A + S [2r + 2] C = C + S [2r + 3] C = C S [2r + 3] A = A S [2r + 2] for i = r down to 1 do { (A, B, C, D) = (D, A, B, C) u = (D X (2D + 1)) <<< lg w t = (B X (2B + 1)) <<< lg w C = ((C S [2i + 1]) >>> t) u A = ((A S [2i]) >>> u) t } D = D S [1] B = B S [0] The design of RC6 is more complex than that of RC5, and consequently an analysis of the cipher gets more involved [4]. The security of RC6 relies on the strength of datadependent rotations, the mixed use of exclusive-or operations and modular additions, and on the squaring function f together with the fixed rotation squaring function f together with the fixed rotation [3]. Fig. (3) Shows the design of RC6. 3- Application of RC6 for Digital Images A text message securely transferred by hiding it in a digital image file. 128 bit AES encryption is used to protect the content of the text message even if its presence were to be detected. Currently, no methods are known for breaking this kind of encryption within a reasonable period of time. Additionally, compression is used to maximize the space available in an image [5]. To send a message, a source text, an image in which the text should be embedded, and a key are needed. The key is used to aid in encryption and to decide where the information should be hidden in the image; another image or a short text can be used as a key. To receive a message, a source image containing the information and the corresponding key are both required. The Figure (3): Diagram of RC6 [6]. 5
6 We use the GIF image-horse of size 140*60 plain text size ( 164 char) and RC6-32/20/16 are used. Figure (4) show six state for horse image motion for original image, Figure (5) show the results of RC6 block cipher for horse sub image (15*15) in both encryption/decryption digital images successfully. Also, it reveals its effectiveness in hiding the information in both encryption/decryption contained in them. In this paper, the plaintext that wants to be encrypted put it inside part of the selected image. The part of the image which is the heel of the right leg, where has been used to put the text inside the image after encrypt and merge the data of the part of the image with the data of the encrypted text in order to be transformed via internet by an letter. The algorithm RC6 was applied on the plaintext to be encrypted. Then the encrypted data were put and merged with the data of the selected part.figure (6) illustrates the encrypted text. Six shots were taken to the chosen part as illustrated by the Figure (5). The data of the sub image that selected from the original image are changing after each motion of the horse s body and can be illustrated in the Table (2): The results of the encryption/decryption in sec. are illustrated in Table (3). 6 Figure (5): Application of RC6 Cipher to Plain Text Cipher Tex Image.
7 7
8 Table (3): Enciphering/Deciphering Speed Test Results Table (2): Data of Sub Image (18*20) from the Original Image. Image size (in pixels) Colors Encryption in Sec Decryption in Sec x x x x x x x x
9 Interchange Format (GIF) is CompuServe's standard for defining generalized color raster images. This Graphics Interchange Format allows highquality, high-resolution graphics to be displayed on a variety of graphics hardware and is intended as an exchange and display mechanism for graphics images 〤 mm3 Ӫ ƣ ử [ص MHz 4 ş 7 (b) (a) Figure (6):(a) Encrypted Text in Sub Image (b) Decrypted Sub Image 4- Encryption Quality Measurement Some analysis is to be examined for the measurement of encryption quality and to provide the effect of RC6 block cipher design parameters such as block size, secret key length and number of rounds on the encryption quality of RC6 block cipher for digital images [7]. Encryption Quality L H L ( F ' ) H 256 L ( F)..(1) Table (4) shows RC6 block cipher algorithm at different design parameters. To test the correlation between two vertically 9
10 adjacent pixels, two horizontally adjacent pixels, and two diagonally adjacent pixels in plain image/cipher image, respectively, the procedure is as follows: First, randomly select 1000 pairs of two adjacent pixels from an image. Then, calculate their correlation coefficient using the following two formulas [7]: cov( x, y) E( x E( x))( y E( y))...(2) cov( x, y) r xy...(3) D( x) D( y) 1 E( x) N 1 D( x) N N x i i1 N i1 1 cov( x, y) N ( x...(4) i N i1 E( x)) ( x i 2 E ( x))( y...(5) i E( y))..(6) Table (4): Different Design Parameters of RC6 Algorithm. Visual Inspection to Judge the Effectiveness of the Differences Parameters e Our Research W (word size in bits) 16, 32, bit R (No. of rounds) 0, 1, 2.., B (Key length) 0, 1, 2.., Block size in words 4W 4W Block size in bites 64,128, Max block size in bites No. of keys derived from key schedule r+4 2r+4 = 44 directions were obtained. In this paper, sample form six state were taken to explain the correlation and convolution as shown in the Figure (7). Where x and y are GIF image values of two adjacent pixels in the image. In numerical computations, the following discrete formulas were used. The correlation coefficients are and respectively for RC6, which are far a part results for diagonal and vertical Figure (7): (a) Sample Sub Image Correlation. (b): Sample Sub Image Convolution. 0
11 5- Results and Implementation: This paper introduces a successfully efficient implementation of RC6 block cipher for digital image providing its testing, verification, encryption efficiency analysis, and security evaluation. A mathematical modeling for encryption efficiency evaluation, that is called encryption quality was proposed, and may be considered to compare the effectiveness of different encryption techniques to digital images instead of visual inspection. The obtained results shows that the RC6 block cipher achieve most better encryption quality for the choices of word size w=4, number of rounds=20, and secret key length b=32. Based on such results, the optimal version of RC6-w/r/b block cipher algorithm that gives maximum encryption quality is estimated to be RC6-32/20/16 From an engineer's perspective, the use of RC6 block cipher algorithm as a candidate for image encryption is very promising for real-time secure image and video communications in military, industrial, as well as commercial applications. Table ( 5): shows numbers of cycles and speed in RC6 for GIF image. Table (5): RC6 Implementation for GIF Image. Key setup Encryption Decryption RC6 GIF at 43.7 MHZ 188 cycles 4305 ns 21 cycles 480 ns 21 cycles 480 ns Min. Period (ns) Max. Frequency (MHz) 43.7 Throughput Including key generation Throughput Encryption/Decryption only 27 Mbit/sec 266 Mbit/sec RC6 no need to reload the round keys every time the user changes the input key. 1
12 In this work, we satisfy the aim that says the encryption is an effective way to obscure data and hide the sensitive information. The present algorithm allows an individual to hide data inside other data with hopes that the transfer medium will be so obscure that no one would ever think to examine the contents of the file. The algorithm which is described by pseudo-code is presented and it is possible to implement a encryption algorithm to hide a large amount of data into carrier bitmap image. We used three layers of security to secured data by obscuring the context in which it was transferred. With continued research and an improvement in algorithms design, encryption can be taken as a serious way to hide data and the present work appears that it was more efficient than the most familiar algorithm like (S-Tools) [8]. Working against visual and statistical attacks need adaptive algorithm on each step of data embedded. It was found that the present algorithm was attractive and results reached by this algorithm were efficient in the field of data embedding (encryption). We performed three types of comparison; the first one, was used to compare the present algorithm with S-Tools algorithm through the amount of noise and the amount of size. It appears that the present work was less effective of the noise at the pixels and lager amount of embedded data. The second comparison was made upon the statistical attack; it shows that it was difficult to distinguish between Cover and Stego image when chi square and the difference between neighboring pixels were implemented. The last comparison was found that visual attack results indicate that using non uniform color was extremely powerful when we have large amount of embedded data. [1] Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images, International Journal of Computer, Information and Systems Science and Engineering, Winter, [2] Hamza A. Ali and Bashar M. Ne ma2, Effective Variations on Opened GIF Format Images, IJCSNS International Journal of Computer Science and Network 70 Security, VOL.8 No.5, May [3] Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images, Journal of Optical Engineering, Vol.45, [4] Ralf Steinmetz, Klara Nahrstedt, Multimedia Systems, Springer, [5] Shujun Li, Guanrong Chen and Xuan Zheng, Chaos-based encryption for digital images and videos, chapter 4 in Multimedia Security Handbook, February [6] Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, Implementation of RC5 Block Cipher Algorithm for Digital Images, Proceeding of The 5th Central European Conference on Cryptography, Brno, The Czech Republic,15-17 June, [7] Nawal El-Fishawy and Osama M. Abu Zaid, Quality of Encryption Measurement of GIF Image Images with RC6, MRC6, and Rijndael Block Cipher Algorithms, International Journal of Network Security, Vol.5, No.3, PP , Nov [8] Ronald L. Rivest, M. J. B. Robshaw, R. Sidney and Y. L. Yin, The RC6 Block Cipher, V1.1, August 20, References: 2
13 [9] Marwa Abd El-Wahed, Saleh Mesbah,and Amin Shoukry, Efficiency and Security of Some Image Encryption Algorithms, Proceesings of the World Congress on Engineering, Vol I WCE, London, U.K., July 2-4, [10] Yaobin Mao, Guanrong Chen, and Shiguo Lian, A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps, Chaos, Solutions and Fractals 21,
14 4
21.1. Unit 21. Hardware Acceleration
21.1 Unit 21 Hardware Acceleration 21.2 Motivation When designing hardware we have nearly unlimited control and parallelism at our disposal We can create structures that may dramatically improve performance
More informationMULTIMEDIA TECHNOLOGIES
MULTIMEDIA TECHNOLOGIES LECTURE 08 VIDEO IMRAN IHSAN ASSISTANT PROFESSOR VIDEO Video streams are made up of a series of still images (frames) played one after another at high speed This fools the eye into
More informationChapt er 3 Data Representation
Chapter 03 Data Representation Chapter Goals Distinguish between analog and digital information Explain data compression and calculate compression ratios Explain the binary formats for negative and floating-point
More informationEMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING
EMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING Harmandeep Singh Nijjar 1, Charanjit Singh 2 1 MTech, Department of ECE, Punjabi University Patiala 2 Assistant Professor, Department
More informationA Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register
A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register Saad Muhi Falih Department of Computer Technical Engineering Islamic University College Al Najaf al Ashraf, Iraq saadmuheyfalh@gmail.com
More informationFully Pipelined High Speed SB and MC of AES Based on FPGA
Fully Pipelined High Speed SB and MC of AES Based on FPGA S.Sankar Ganesh #1, J.Jean Jenifer Nesam 2 1 Assistant.Professor,VIT University Tamil Nadu,India. 1 s.sankarganesh@vit.ac.in 2 jeanjenifer@rediffmail.com
More informationResearch Article. ISSN (Print) *Corresponding author Shireen Fathima
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(4C):613-620 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationSteganographic Technique for Hiding Secret Audio in an Image
Steganographic Technique for Hiding Secret Audio in an Image 1 Aiswarya T, 2 Mansi Shah, 3 Aishwarya Talekar, 4 Pallavi Raut 1,2,3 UG Student, 4 Assistant Professor, 1,2,3,4 St John of Engineering & Management,
More informationPivoting Object Tracking System
Pivoting Object Tracking System [CSEE 4840 Project Design - March 2009] Damian Ancukiewicz Applied Physics and Applied Mathematics Department da2260@columbia.edu Jinglin Shen Electrical Engineering Department
More informationNew Address Shift Linear Feedback Shift Register Generator
New Address Shift Linear Feedback Shift Register Generator Kholood J. Moulood Department of Mathematical, Tikrit University, College of Education for Women, Salahdin. E-mail: khmsc2006@yahoo.com. Abstract
More informationKeywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 164 High Security Video Steganography Putti DeepthiChandan, Dr. M. Narayana Abstract- Video Steganography is a technique
More informationPart 1: Introduction to Computer Graphics
Part 1: Introduction to Computer Graphics 1. Define computer graphics? The branch of science and technology concerned with methods and techniques for converting data to or from visual presentation using
More informationSimple motion control implementation
Simple motion control implementation with Omron PLC SCOPE In todays challenging economical environment and highly competitive global market, manufacturers need to get the most of their automation equipment
More informationUnderstanding Compression Technologies for HD and Megapixel Surveillance
When the security industry began the transition from using VHS tapes to hard disks for video surveillance storage, the question of how to compress and store video became a top consideration for video surveillance
More informationPractical Application of the Phased-Array Technology with Paint-Brush Evaluation for Seamless-Tube Testing
ECNDT 2006 - Th.1.1.4 Practical Application of the Phased-Array Technology with Paint-Brush Evaluation for Seamless-Tube Testing R.H. PAWELLETZ, E. EUFRASIO, Vallourec & Mannesmann do Brazil, Belo Horizonte,
More informationENGINEERING COMMITTEE
ENGINEERING COMMITTEE Interface Practices Subcommittee SCTE STANDARD SCTE 45 2017 Test Method for Group Delay NOTICE The Society of Cable Telecommunications Engineers (SCTE) Standards and Operational Practices
More informationUnderstanding IP Video for
Brought to You by Presented by Part 3 of 4 B1 Part 3of 4 Clearing Up Compression Misconception By Bob Wimmer Principal Video Security Consultants cctvbob@aol.com AT A GLANCE Three forms of bandwidth compression
More informationTechNote: MuraTool CA: 1 2/9/00. Figure 1: High contrast fringe ring mura on a microdisplay
Mura: The Japanese word for blemish has been widely adopted by the display industry to describe almost all irregular luminosity variation defects in liquid crystal displays. Mura defects are caused by
More informationImage Steganalysis: Challenges
Image Steganalysis: Challenges Jiwu Huang,China BUCHAREST 2017 Acknowledgement Members in my team Dr. Weiqi Luo and Dr. Fangjun Huang Sun Yat-sen Univ., China Dr. Bin Li and Dr. Shunquan Tan, Mr. Jishen
More informationCM3106 Solutions. Do not turn this page over until instructed to do so by the Senior Invigilator.
CARDIFF UNIVERSITY EXAMINATION PAPER Academic Year: 2013/2014 Examination Period: Examination Paper Number: Examination Paper Title: Duration: Autumn CM3106 Solutions Multimedia 2 hours Do not turn this
More informationOptimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015
Optimization of Multi-Channel BCH Error Decoding for Common Cases Russell Dill Master's Thesis Defense April 20, 2015 Bose-Chaudhuri-Hocquenghem (BCH) BCH is an Error Correcting Code (ECC) and is used
More informationDesign Project: Designing a Viterbi Decoder (PART I)
Digital Integrated Circuits A Design Perspective 2/e Jan M. Rabaey, Anantha Chandrakasan, Borivoje Nikolić Chapters 6 and 11 Design Project: Designing a Viterbi Decoder (PART I) 1. Designing a Viterbi
More informationAnimation and Video. Contents. 5.0 Aims and Objectives. 5.1 Introduction. 5.2 Principles of Animation
31 Lesson 5 Animation and Video Contents 5.0 Aims and Objectives 5.1 Introduction 5.2 Principles of Animation 5.3 Animation Techniques 5.4 Animation File formats 5.5 Video 5.6 Broadcast video Standard
More informationA Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique
A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique Dhaval R. Bhojani Research Scholar, Shri JJT University, Jhunjunu, Rajasthan, India Ved Vyas Dwivedi, PhD.
More informationMotion Video Compression
7 Motion Video Compression 7.1 Motion video Motion video contains massive amounts of redundant information. This is because each image has redundant information and also because there are very few changes
More informationGraphics Concepts. David Cairns
Graphics Concepts David Cairns Introduction The following material provides a brief introduction to some standard graphics concepts. For more detailed information, see DGJ, Chapter 2, p23. Display Modes
More informationImplementation of an MPEG Codec on the Tilera TM 64 Processor
1 Implementation of an MPEG Codec on the Tilera TM 64 Processor Whitney Flohr Supervisor: Mark Franklin, Ed Richter Department of Electrical and Systems Engineering Washington University in St. Louis Fall
More informationInvestigation of Digital Signal Processing of High-speed DACs Signals for Settling Time Testing
Universal Journal of Electrical and Electronic Engineering 4(2): 67-72, 2016 DOI: 10.13189/ujeee.2016.040204 http://www.hrpub.org Investigation of Digital Signal Processing of High-speed DACs Signals for
More informationDELTA MODULATION AND DPCM CODING OF COLOR SIGNALS
DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS Item Type text; Proceedings Authors Habibi, A. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings
More informationResearch Article Design and Analysis of a High Secure Video Encryption Algorithm with Integrated Compression and Denoising Block
Research Journal of Applied Sciences, Engineering and Technology 11(6): 603-609, 2015 DOI: 10.19026/rjaset.11.2019 ISSN: 2040-7459; e-issn: 2040-7467 2015 Maxwell Scientific Publication Corp. Submitted:
More informationUTILIZATION OF MATLAB FOR THE DIGITAL SIGNAL TRANSMISSION SIMULATION AND ANALYSIS IN DTV AND DVB AREA. Tomáš Kratochvíl
UTILIZATION OF MATLAB FOR THE DIGITAL SIGNAL TRANSMISSION SIMULATION AND ANALYSIS IN DTV AND DVB AREA Tomáš Kratochvíl Institute of Radio Electronics, Brno University of Technology Faculty of Electrical
More informationKey-based scrambling for secure image communication
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Key-based scrambling for secure image communication
More informationStream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers
More informationIntroduction to image compression
Introduction to image compression 1997-2015 Josef Pelikán CGG MFF UK Praha pepca@cgg.mff.cuni.cz http://cgg.mff.cuni.cz/~pepca/ Compression 2015 Josef Pelikán, http://cgg.mff.cuni.cz/~pepca 1 / 12 Motivation
More informationBeyond the Resolution: How to Achieve 4K Standards
Beyond the Resolution: How to Achieve 4K Standards The following article is inspired by the training delivered by Adriano D Alessio of the Lightware a leading manufacturer of DVI, HDMI, and DisplayPort
More informationCOMP 249 Advanced Distributed Systems Multimedia Networking. Video Compression Standards
COMP 9 Advanced Distributed Systems Multimedia Networking Video Compression Standards Kevin Jeffay Department of Computer Science University of North Carolina at Chapel Hill jeffay@cs.unc.edu September,
More informationFilm Grain Technology
Film Grain Technology Hollywood Post Alliance February 2006 Jeff Cooper jeff.cooper@thomson.net What is Film Grain? Film grain results from the physical granularity of the photographic emulsion Film grain
More informationModule 3: Video Sampling Lecture 16: Sampling of video in two dimensions: Progressive vs Interlaced scans. The Lecture Contains:
The Lecture Contains: Sampling of Video Signals Choice of sampling rates Sampling a Video in Two Dimensions: Progressive vs. Interlaced Scans file:///d /...e%20(ganesh%20rana)/my%20course_ganesh%20rana/prof.%20sumana%20gupta/final%20dvsp/lecture16/16_1.htm[12/31/2015
More informationModule 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur
Module 8 VIDEO CODING STANDARDS Lesson 27 H.264 standard Lesson Objectives At the end of this lesson, the students should be able to: 1. State the broad objectives of the H.264 standard. 2. List the improved
More informationAn Overview of Video Coding Algorithms
An Overview of Video Coding Algorithms Prof. Ja-Ling Wu Department of Computer Science and Information Engineering National Taiwan University Video coding can be viewed as image compression with a temporal
More informationPart 1: Introduction to computer graphics 1. Describe Each of the following: a. Computer Graphics. b. Computer Graphics API. c. CG s can be used in
Part 1: Introduction to computer graphics 1. Describe Each of the following: a. Computer Graphics. b. Computer Graphics API. c. CG s can be used in solving Problems. d. Graphics Pipeline. e. Video Memory.
More informationDESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY
DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY Vijay Shankar Pendluri, Pankaj Gupta Wipro Technologies India vijay_shankarece@yahoo.com, pankaj_gupta96@yahoo.com Abstract - This paper
More informationChapter 2 Introduction to
Chapter 2 Introduction to H.264/AVC H.264/AVC [1] is the newest video coding standard of the ITU-T Video Coding Experts Group (VCEG) and the ISO/IEC Moving Picture Experts Group (MPEG). The main improvements
More informationInSync White Paper : Achieving optimal conversions in UHDTV workflows April 2015
InSync White Paper : Achieving optimal conversions in UHDTV workflows April 2015 Abstract - UHDTV 120Hz workflows require careful management of content at existing formats and frame rates, into and out
More informationShot Transition Detection Scheme: Based on Correlation Tracking Check for MB-Based Video Sequences
, pp.120-124 http://dx.doi.org/10.14257/astl.2017.146.21 Shot Transition Detection Scheme: Based on Correlation Tracking Check for MB-Based Video Sequences Mona A. M. Fouad 1 and Ahmed Mokhtar A. Mansour
More informationPRACTICAL APPLICATION OF THE PHASED-ARRAY TECHNOLOGY WITH PAINT-BRUSH EVALUATION FOR SEAMLESS-TUBE TESTING
PRACTICAL APPLICATION OF THE PHASED-ARRAY TECHNOLOGY WITH PAINT-BRUSH EVALUATION FOR SEAMLESS-TUBE TESTING R.H. Pawelletz, E. Eufrasio, Vallourec & Mannesmann do Brazil, Belo Horizonte, Brazil; B. M. Bisiaux,
More informationInterlace and De-interlace Application on Video
Interlace and De-interlace Application on Video Liliana, Justinus Andjarwirawan, Gilberto Erwanto Informatics Department, Faculty of Industrial Technology, Petra Christian University Surabaya, Indonesia
More informationLFSR Based Watermark and Address Generator for Digital Image Watermarking SRAM
LFSR Based Watermark and Address Generator for igital Image Watermarking SRAM S. Bhargav Kumar #1, S.Jagadeesh *2, r.m.ashok #3 #1 P.G. Student, M.Tech. (VLSI), epartment of Electronics and Communication
More informationTECHNICAL REQUIREMENTS Commercial Spots
TECHNICAL REQUIREMENTS Commercial Spots April, 2017 Content General Information... 3 Delivery of Commercial Spots... 4 Video Format... 4 Audio Format... 4 Time Code... 4 Delivery of Commercial Spots as
More informationSupervision of Analogue Signal Paths in Legacy Media Migration Processes using Digital Signal Processing
Welcome Supervision of Analogue Signal Paths in Legacy Media Migration Processes using Digital Signal Processing Jörg Houpert Cube-Tec International Oslo, Norway 4th May, 2010 Joint Technical Symposium
More informationLecture 2 Video Formation and Representation
2013 Spring Term 1 Lecture 2 Video Formation and Representation Wen-Hsiao Peng ( 彭文孝 ) Multimedia Architecture and Processing Lab (MAPL) Department of Computer Science National Chiao Tung University 1
More informationCONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION
2016 International Computer Symposium CONSTRUCTION OF LOW-DISTORTED MESSAGE-RICH VIDEOS FOR PERVASIVE COMMUNICATION 1 Zhen-Yu You ( ), 2 Yu-Shiuan Tsai ( ) and 3 Wen-Hsiang Tsai ( ) 1 Institute of Information
More informationPA Substitution Cipher
Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A
More informationObjectives: Topics covered: Basic terminology Important Definitions Display Processor Raster and Vector Graphics Coordinate Systems Graphics Standards
MODULE - 1 e-pg Pathshala Subject: Computer Science Paper: Computer Graphics and Visualization Module: Introduction to Computer Graphics Module No: CS/CGV/1 Quadrant 1 e-text Objectives: To get introduced
More informationISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com
More informationPerformance Evaluation of Stream Ciphers on Large Databases
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.9, September 28 285 Performance Evaluation of Stream Ciphers on Large Databases Dr.M.Sikandar Hayat Khiyal Aihab Khan Saria
More informationVideo Compression. Representations. Multimedia Systems and Applications. Analog Video Representations. Digitizing. Digital Video Block Structure
Representations Multimedia Systems and Applications Video Compression Composite NTSC - 6MHz (4.2MHz video), 29.97 frames/second PAL - 6-8MHz (4.2-6MHz video), 50 frames/second Component Separation video
More informationZONE PLATE SIGNALS 525 Lines Standard M/NTSC
Application Note ZONE PLATE SIGNALS 525 Lines Standard M/NTSC Products: CCVS+COMPONENT GENERATOR CCVS GENERATOR SAF SFF 7BM23_0E ZONE PLATE SIGNALS 525 lines M/NTSC Back in the early days of television
More informationWritten Tutorial and copyright 2016 by Open for free distribution as long as author acknowledgment remains.
Written Tutorial and copyright 2016 by www.miles-milling.com. Open for free distribution as long as author acknowledgment remains. This Tutorial will show us how to do both a raster and cutout using GPL
More informationMultiple Image Secret Sharing based on Linear System
Indian Journal of Science and Technology, Vol 10(33), 10.17485/ijst/2017/v10i33/113085, September 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Multiple Image Secret Sharing based on Linear System
More informationDigital Video Telemetry System
Digital Video Telemetry System Item Type text; Proceedings Authors Thom, Gary A.; Snyder, Edwin Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings
More information(12) Patent Application Publication (10) Pub. No.: US 2003/ A1
(19) United States US 2003O152221A1 (12) Patent Application Publication (10) Pub. No.: US 2003/0152221A1 Cheng et al. (43) Pub. Date: Aug. 14, 2003 (54) SEQUENCE GENERATOR AND METHOD OF (52) U.S. C.. 380/46;
More informationCompressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract:
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract: This article1 presents the design of a networked system for joint compression, rate control and error correction
More informationInformation Transmission Chapter 3, image and video
Information Transmission Chapter 3, image and video FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY Images An image is a two-dimensional array of light values. Make it 1D by scanning Smallest element
More informationLossless Compression Algorithms for Direct- Write Lithography Systems
Lossless Compression Algorithms for Direct- Write Lithography Systems Hsin-I Liu Video and Image Processing Lab Department of Electrical Engineering and Computer Science University of California at Berkeley
More informationDetection and demodulation of non-cooperative burst signal Feng Yue 1, Wu Guangzhi 1, Tao Min 1
International Conference on Applied Science and Engineering Innovation (ASEI 2015) Detection and demodulation of non-cooperative burst signal Feng Yue 1, Wu Guangzhi 1, Tao Min 1 1 China Satellite Maritime
More informationTemporal Error Concealment Algorithm Using Adaptive Multi- Side Boundary Matching Principle
184 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 Temporal Error Concealment Algorithm Using Adaptive Multi- Side Boundary Matching Principle Seung-Soo
More informationCS408 Cryptography & Internet Security
CS408 Cryptography & Internet Security Lecture 4: Rotor Machines Enigma Reza Curtmola Department of Computer Science / NJIT How to move from pencil and paper to more automatic ways of encrypting and decrypting?
More informationAudio Compression Technology for Voice Transmission
Audio Compression Technology for Voice Transmission 1 SUBRATA SAHA, 2 VIKRAM REDDY 1 Department of Electrical and Computer Engineering 2 Department of Computer Science University of Manitoba Winnipeg,
More informationLecture 23: Digital Video. The Digital World of Multimedia Guest lecture: Jayson Bowen
Lecture 23: Digital Video The Digital World of Multimedia Guest lecture: Jayson Bowen Plan for Today Digital video Video compression HD, HDTV & Streaming Video Audio + Images Video Audio: time sampling
More informationVideo coding standards
Video coding standards Video signals represent sequences of images or frames which can be transmitted with a rate from 5 to 60 frames per second (fps), that provides the illusion of motion in the displayed
More informationOPTIMIZING VIDEO SCALERS USING REAL-TIME VERIFICATION TECHNIQUES
OPTIMIZING VIDEO SCALERS USING REAL-TIME VERIFICATION TECHNIQUES Paritosh Gupta Department of Electrical Engineering and Computer Science, University of Michigan paritosg@umich.edu Valeria Bertacco Department
More informationData Storage and Manipulation
Data Storage and Manipulation Data Storage Bits and Their Storage: Gates and Flip-Flops, Other Storage Techniques, Hexadecimal notation Main Memory: Memory Organization, Measuring Memory Capacity Mass
More informationVisual Communication at Limited Colour Display Capability
Visual Communication at Limited Colour Display Capability Yan Lu, Wen Gao and Feng Wu Abstract: A novel scheme for visual communication by means of mobile devices with limited colour display capability
More informationA Digital Hologram Encryption Method Using Data Scrambling of Frequency Coefficients
J. lnf. Commun. Converg. Eng. 11(3): 185-189, Sep. 2013 Regular paper A Digital Hologram Encryption Method Using Data Scrambling of Frequency Coefficients Hyun-Jun Choi *, Member, KIICE Department of Electronic
More informationA Layered Approach for Watermarking In Images Based On Huffman Coding
A Layered Approach for Watermarking In Images Based On Huffman Coding D. Lalitha Bhaskari 1 P. S. Avadhani 1 M. Viswanath 2 1 Department of Computer Science & Systems Engineering, Andhra University, 2
More informationDESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA GENERATOR
International Journal of Computer Science and Applications, Vol. 6, No, 4, pp 43-62, 29 Technomathematics Research Foundation DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA
More informationModule 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur
Module 8 VIDEO CODING STANDARDS Lesson 24 MPEG-2 Standards Lesson Objectives At the end of this lesson, the students should be able to: 1. State the basic objectives of MPEG-2 standard. 2. Enlist the profiles
More informationStream Labs, JSC. Stream Logo SDI 2.0. User Manual
Stream Labs, JSC. Stream Logo SDI 2.0 User Manual Nov. 2004 LOGO GENERATOR Stream Logo SDI v2.0 Stream Logo SDI v2.0 is designed to work with 8 and 10 bit serial component SDI input signal and 10-bit output
More informationA video signal processor for motioncompensated field-rate upconversion in consumer television
A video signal processor for motioncompensated field-rate upconversion in consumer television B. De Loore, P. Lippens, P. Eeckhout, H. Huijgen, A. Löning, B. McSweeney, M. Verstraelen, B. Pham, G. de Haan,
More informationSimulation of Micro Blanking Process of Square Hole with Fillet Based on DEFORM-3D
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Simulation of Micro Blanking Process of Square Hole with Fillet Based on DEFORM-3D Shining Zhou 1,a, Xiaolong
More informationMultimedia: is any combination of: text, graphic art, sound, animation, video delivered by computer or electronic means.
Chapter #1. Multimedia: is any combination of: text, graphic art, sound, animation, video delivered by computer or electronic means. Multimedia types: Interactive multimedia: allows the user to control
More informationLFSR stream cipher RC4. Stream cipher. Stream Cipher
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 89 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers
More informationDistortion Analysis Of Tamil Language Characters Recognition
www.ijcsi.org 390 Distortion Analysis Of Tamil Language Characters Recognition Gowri.N 1, R. Bhaskaran 2, 1. T.B.A.K. College for Women, Kilakarai, 2. School Of Mathematics, Madurai Kamaraj University,
More informationThe BAT WAVE ANALYZER project
The BAT WAVE ANALYZER project Conditions of Use The Bat Wave Analyzer program is free for personal use and can be redistributed provided it is not changed in any way, and no fee is requested. The Bat Wave
More informationAudio and Video II. Video signal +Color systems Motion estimation Video compression standards +H.261 +MPEG-1, MPEG-2, MPEG-4, MPEG- 7, and MPEG-21
Audio and Video II Video signal +Color systems Motion estimation Video compression standards +H.261 +MPEG-1, MPEG-2, MPEG-4, MPEG- 7, and MPEG-21 1 Video signal Video camera scans the image by following
More informationMPEGTool: An X Window Based MPEG Encoder and Statistics Tool 1
MPEGTool: An X Window Based MPEG Encoder and Statistics Tool 1 Toshiyuki Urabe Hassan Afzal Grace Ho Pramod Pancha Magda El Zarki Department of Electrical Engineering University of Pennsylvania Philadelphia,
More informationAUDIOVISUAL COMMUNICATION
AUDIOVISUAL COMMUNICATION Laboratory Session: Recommendation ITU-T H.261 Fernando Pereira The objective of this lab session about Recommendation ITU-T H.261 is to get the students familiar with many aspects
More informationGetting Started After Effects Files More Information. Global Modifications. Network IDs. Strand Opens. Bumpers. Promo End Pages.
TABLE of CONTENTS 1 Getting Started After Effects Files More Information Introduction 2 Global Modifications 9 Iconic Imagery 21 Requirements 3 Network IDs 10 Summary 22 Toolkit Specifications 4 Strand
More informationPrecautions and Disclaimers What You Can Do with Geometry Manager Pro Check Your Computer System requirements...
Operating Instructions Geometric & Setup Management Software Windows Geometry Manager Pro Ver. 4.0 Thank you for purchasing this Panasonic product. Before using this software, please read the instructions
More informationA simplified fractal image compression algorithm
A simplified fractal image compression algorithm A selim*, M M Hadhoud $,, M I Dessouky # and F E Abd El-Samie # *ERTU,Egypt $ Dept of Inform Tech, Faculty of Computers and Information, Menoufia Univ,
More informationCh. 1: Audio/Image/Video Fundamentals Multimedia Systems. School of Electrical Engineering and Computer Science Oregon State University
Ch. 1: Audio/Image/Video Fundamentals Multimedia Systems Prof. Ben Lee School of Electrical Engineering and Computer Science Oregon State University Outline Computer Representation of Audio Quantization
More informationMATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM
MATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM Abdul Kareem Murhij Radhi College of Information Engineering, University of Nahrian,Baghdad- Iraq. Abstract Stream cipher system
More informationWhite Paper. Uniform Luminance Technology. What s inside? What is non-uniformity and noise in LCDs? Why is it a problem? How is it solved?
White Paper Uniform Luminance Technology What s inside? What is non-uniformity and noise in LCDs? Why is it a problem? How is it solved? Tom Kimpe Manager Technology & Innovation Group Barco Medical Imaging
More information2. AN INTROSPECTION OF THE MORPHING PROCESS
1. INTRODUCTION Voice morphing means the transition of one speech signal into another. Like image morphing, speech morphing aims to preserve the shared characteristics of the starting and final signals,
More informationDual Link DVI Receiver Implementation
Dual Link DVI Receiver Implementation This application note describes some features of single link receivers that must be considered when using 2 devices for a dual link application. Specific characteristics
More information9 Analyzing Digital Sources and Cables
9 Analyzing Digital Sources and Cables Topics in this chapter: Getting started Measuring timing of video signal Testing cables and distribution systems Testing video signal quality from a source Testing
More informationPaulo V. K. Borges. Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) PRESENTATION
Paulo V. K. Borges Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) 07942084331 vini@ieee.org PRESENTATION Electronic engineer working as researcher at University of London. Doctorate in digital image/video
More informationNew forms of video compression
New forms of video compression New forms of video compression Why is there a need? The move to increasingly higher definition and bigger displays means that we have increasingly large amounts of picture
More informationReducing DDR Latency for Embedded Image Steganography
Reducing DDR Latency for Embedded Image Steganography J Haralambides and L Bijaminas Department of Math and Computer Science, Barry University, Miami Shores, FL, USA Abstract - Image steganography is the
More information